Patents by Inventor Weng Sing Tang
Weng Sing Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9973521Abstract: Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts the words contained within the training security log and replaces each of the extracted words with a symbol to form a symbol string and an n-gram scan is conducted on the symbol string to generate statistical data. Tokens are extracted from symbol string, where the tokens are words, phrase or alphanumeric sequence represented by a symbol within training security log stream. The symbol string is replaced with the words they represent to allow for the identification of the actual token phrases. A scan is conducted on the token phrase to acquire scan data on the identified token phrases. Once the tokens, position information, and scan data are known they are stored within the database to allow security log streams to be analyzed in real time.Type: GrantFiled: December 28, 2015Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Tien Hiong Lee, Konstantin Levinski, Xin Qian, Harjoben Singh, Weng Sing Tang
-
Publication number: 20180129549Abstract: A mechanism is provided for detecting one or more defects in an incoming log. One or more features are extracted from the incoming log. Utilizing the one or more features, one or more patterns, one or more pattern sequences of the one or more patterns, and one or more proximities associated with the one or more patterns contained in the incoming log are identified. For each defect model generated for the incoming log, a set of patterns in the defect model is compared to a set of patterns in each previously identified defect model in a set of previously identified defect models. Responsive to identifying a match and responsive to set of scores associated with the match meeting or exceeding a set of probability thresholds, an identification associated with the previously identified defect model along with any solution or workaround is passed to a support engineer.Type: ApplicationFiled: November 9, 2016Publication date: May 10, 2018Inventors: Christopher G. Fredericks, Tien Hiong Lee, Konstantin Levinski, Xin Qian, Weng Sing Tang, Xiang Zhang
-
Publication number: 20180004800Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.Type: ApplicationFiled: September 25, 2017Publication date: January 4, 2018Inventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
-
Publication number: 20170364402Abstract: A log entry identifies an error in the computer or other system. Another log entry identifies a symptom associated with the system error. The symptom occurs in timeframe prior to the system error and a variable score is determined for the symptom according to the timeframe, the consistency with which the symptom appears along with the error, and the frequency with which the symptom occurs throughout the system log. A new occurrence of the symptom is identified. Whether the symptom's variable score exceeds a threshold value for the symptom is determined. In response to determining that the symptom's variable score exceeds the threshold value, an alert indicating that the associated system error is probable is displayed.Type: ApplicationFiled: June 21, 2016Publication date: December 21, 2017Inventors: Wei Liang Chua, Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang
-
Publication number: 20170351748Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.Type: ApplicationFiled: August 22, 2017Publication date: December 7, 2017Inventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
-
Publication number: 20170206268Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.Type: ApplicationFiled: January 20, 2016Publication date: July 20, 2017Inventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
-
Publication number: 20170187734Abstract: Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts the words contained within the training security log and replaces each of the extracted words with a symbol to form a symbol string and an n-gram scan is conducted on the symbol string to generate statistical data. Tokens are extracted from symbol string, where the tokens are words, phrase or alphanumeric sequence represented by a symbol within training security log stream. The symbol string is replaced with the words they represent to allow for the identification of the actual token phrases. A scan is conducted on the token phrase to acquire scan data on the identified token phrases. Once the tokens, position information, and scan data are known they are stored within the database to allow security log streams to be analyzed in real time.Type: ApplicationFiled: December 28, 2015Publication date: June 29, 2017Inventors: Tien Hiong Lee, Konstantin Levinski, XIN QIAN, Harjoben Singh, Weng Sing Tang
-
Patent number: 9684707Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.Type: GrantFiled: September 8, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
-
Publication number: 20170139975Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.Type: ApplicationFiled: November 17, 2015Publication date: May 18, 2017Inventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
-
Patent number: 9613162Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.Type: GrantFiled: June 15, 2016Date of Patent: April 4, 2017Assignee: International Business Machines CorporationInventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
-
Patent number: 9519698Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.Type: GrantFiled: March 15, 2016Date of Patent: December 13, 2016Assignee: International Business Machines CorporationInventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
-
Publication number: 20160283854Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.Type: ApplicationFiled: June 2, 2015Publication date: September 29, 2016Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
-
Publication number: 20160283853Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.Type: ApplicationFiled: March 27, 2015Publication date: September 29, 2016Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
-
Patent number: 9424520Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.Type: GrantFiled: March 9, 2016Date of Patent: August 23, 2016Assignee: International Business Machines CorporationInventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
-
Publication number: 20160205085Abstract: According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.Type: ApplicationFiled: March 23, 2016Publication date: July 14, 2016Inventor: Weng Sing Tang
-
Patent number: 9313212Abstract: According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.Type: GrantFiled: March 19, 2013Date of Patent: April 12, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Weng Sing Tang
-
Patent number: 9229671Abstract: A method for embedding an optical security feature in a digital document with a virtual printer and a security feature service and then sending the digital document to a hardware printer.Type: GrantFiled: March 27, 2009Date of Patent: January 5, 2016Assignee: CRIMSONLOGIC PTE LTDInventors: Weng Sing Tang, Fu Wang Thio, Chee Keong Chea, Jym Yew Meng Cheong
-
Patent number: 8930413Abstract: Embodiments for using a dynamic structure of tables in a schema of a multi-tenant database are provided. For a tenant schema including a set of tenant tables, a label is created for a tenant table in the set of tenant tables. The label is partitioned into a set of constituent primary labels. A subset of columns is selected from the set of n columns of the tenant table, the subset of columns corresponding to a primary label in the set of constituent primary labels. The subset of columns is mapped to a table in the dynamic structure of tables in the schema of the multi-tenant database, the table in the dynamic structure of tables having the primary label. In the multi-tenant database executing in a data processing system, the dynamic structure of tables is populated with data from the tenant schema according to the mapping.Type: GrantFiled: January 3, 2012Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Weng Sing Tang, Liang Xu
-
Publication number: 20140289827Abstract: According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.Type: ApplicationFiled: March 19, 2013Publication date: September 25, 2014Applicant: International Business Machines CorporationInventor: Weng Sing Tang
-
Publication number: 20130173669Abstract: Embodiments for using a dynamic structure of tables in a schema of a multi-tenant database are provided. For a tenant schema including a set of tenant tables, a label is created for a tenant table in the set of tenant tables. The label is partitioned into a set of constituent primary labels. A subset of columns is selected from the set of n columns of the tenant table, the subset of columns corresponding to a primary label in the set of constituent primary labels. The subset of columns is mapped to a table in the dynamic structure of tables in the schema of the multi-tenant database, the table in the dynamic structure of tables having the primary label. In the multi-tenant database executing in a data processing system, the dynamic structure of tables is populated with data from the tenant schema according to the mapping.Type: ApplicationFiled: January 3, 2012Publication date: July 4, 2013Applicant: International Business Machines CorporationInventors: WENG SING TANG, LIANG XU